×

Real-time vulnerability monitoring

DC
  • US 9,117,069 B2
  • Filed: 12/21/2013
  • Issued: 08/25/2015
  • Est. Priority Date: 07/01/2003
  • Status: Active Grant
First Claim
Patent Images

1. In a networked computing system comprising a plurality of networked computers on a particular subnet in communication with the Internet, a method comprising:

  • receiving a result of at least one operation in connection with at least one of a plurality of networked devices, the at least one operation based on first information from at least one first data storage identifying a plurality of potential vulnerabilities including at least one first potential vulnerability and at least one second potential vulnerability, the at least one operation configured for;

    identifying at least one configuration associated with the at least one networked device, anddetermining that the at least one networked device is actually vulnerable to at least one actual vulnerability, based on the identified at least one configuration and the first information from the at least one first data storage identifying the plurality of potential vulnerabilities, such that second information associated with the result is stored in at least one second data storage separate from the at least one first data storage, the second information relating to the at least one actual vulnerability to which the at least one networked device is actually vulnerable;

    displaying an indication of the at least one actual vulnerability to which the at least one networked device is actually vulnerable, utilizing the second information;

    accessing a database containing the second information relating to the at least one actual vulnerability to which the at least one networked device is actually vulnerable;

    transmitting a query to the database;

    receiving from the database a result responsive to the query;

    making a security-related determination based on the result;

    displaying, via at least one user interface, a plurality of techniques including a first technique for utilizing an intrusion prevention system for occurrence mitigation, a second technique for utilizing a firewall for occurrence mitigation, and a third technique for installing a software update for occurrence mitigation;

    receiving user input causing selection of the first technique for utilizing the intrusion prevention system for occurrence mitigation;

    based on the user input causing selection of the first technique for utilizing the intrusion prevention system for occurrence mitigation, automatically applying the first technique for utilizing the intrusion prevention system for occurrence mitigation;

    receiving user input causing selection of the second technique for utilizing the firewall for occurrence mitigation;

    based on the user input causing selection of the second technique for utilizing the firewall for occurrence mitigation, automatically applying the second technique for utilizing the firewall for occurrence mitigation;

    receiving user input causing selection of the third technique for installing the software update for occurrence mitigation;

    based on the user input causing selection of the third technique for installing the software update for occurrence mitigation, automatically applying the third technique for installing the software update for occurrence mitigation;

    identifying;

    in connection with the at least one networked device, a first occurrence including at least one first occurrence packet directed to the at least one networked device, andin connection with the at least one networked device, a second occurrence including at least one second occurrence packet directed to the at least one networked device;

    determining;

    that the first occurrence including the at least one first occurrence packet directed to the at least one networked device is capable of taking advantage of the at least one of the actual vulnerability to which the at least one networked device is actually vulnerable;

    that the second occurrence including the at least one second occurrence packet directed to the at least one networked device is not capable of taking advantage of the at least one of the actual vulnerability to which the at least one networked device is actually vulnerable;

    reporting at least the first occurrence based on the determination that the first occurrence including the at least one first occurrence packet directed to the at least one networked device is capable of taking advantage of the at least one of the actual vulnerability to which the at least one networked device is actually vulnerable; and

    preventing the at least one first occurrence packet of the first occurrence from taking advantage of the at least one actual vulnerability to which the at least one networked device is actually vulnerable, while there is no update at the at least one of the networked device that removes the at least one actual vulnerability from the at least one networked device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×